Cheating detection and cheater identification in CRT-based secret sharing schemes

dc.contributor.authorPasailă, Daniel
dc.contributor.authorAlexa, Vlad
dc.contributor.authorIftene, Sorin
dc.date.accessioned2018-12-12T12:24:33Z
dc.date.available2018-12-12T12:24:33Z
dc.date.issued2010
dc.description.abstractIn this paper we analyze the cheating detection and cheater identification problems for the secret sharing schemes based on the Chinese remainder theorem (CRT), more exactly for Mignotte [1] and Asmuth-Bloom [2] schemes. We prove that the majority of the solutions for Shamir’s scheme [3] can be translated to these schemes and, moreover, there are some interesting specific solutions.uk_UA
dc.identifier.citationPasailă, D. Cheating detection and cheater identification in CRT-based secret sharing schemes [Text] / Daniel Pasailă, Vlad Alexa, Sorin Iftene // Computing = Комп’ютинг. - 2010. - Vol. 9, is. 2. - P. 107-117.uk_UA
dc.identifier.urihttp://dspace.tneu.edu.ua/handle/316497/32194
dc.publisherТНЕУuk_UA
dc.subjectsecret sharinguk_UA
dc.subjectChinese remainder theoremuk_UA
dc.subjectcheater detectionuk_UA
dc.subjectcheater identificationuk_UA
dc.titleCheating detection and cheater identification in CRT-based secret sharing schemesuk_UA
dc.typeArticleuk_UA

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Pasaila.pdf
Size:
398.57 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.37 KB
Format:
Item-specific license agreed upon to submission
Description: